-
Notifications
You must be signed in to change notification settings - Fork 168
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
user not in /etc/sudoers #3
Comments
No. The user is not in /etc/sudoers should be easier. the checking function iterates from last rule to first rule. Note:
|
Note: |
I added support 1 rule in /etc/sudoers for exploit_userspec.py. Can you try it and give me a result? |
Yes, It is now work on my system. And I found it doesn't work on my ubuntu16.04.6 offset to first userspec: 0x370 cmnd size: 0x1230 to skip finding offsets next time no this machine, run: |
I totally forgot this case. Ubuntu 16.04 apport is enabled by default. So exit status is coredump (128) + sigsegv (11). Fixed it. Note: apport does coredump on all sigsegv, so the exploit will run much slower. |
When I was in docker,I think the chunks have some difference. bruteforce cannot success even I closed ASLR and use a correct stack addr. |
excuse me,I have learned a lot from your exploit methods。And I found it necessary that the user should be in /etc/sudoers when I use exploit_userspec.py,if the user is not in /etc/sudoers,is it possible to exploit?
The text was updated successfully, but these errors were encountered: